-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 To ensure the image has not been corrupted in transmit or tampered with, perform the following two steps to cryptographically verify image integrity: 1. Verify the authenticity of this file by checking that it is signed with our GPG release key: $ curl https://raw.githubusercontent.com/turnkeylinux/common/master/keys/tkl-buster-images.asc | gpg --import $ gpg --list-keys --with-fingerprint release-buster-images@turnkeylinux.org pub rsa4096 2020-02-05 [SC] [expires: 2040-01-31] A8B2 EF42 8781 9B03 D351 6CCA 7623 1C20 425E 9772 uid [ unknown] TurnKey GNU/Linux Buster Images (GPG signing key for TurnKey Linux Buster Images) sub rsa4096 2020-02-05 [S] [expires: 2040-01-31] $ gpg --verify turnkey-cakephp-16.1-buster-amd64-vmdk.zip.hash gpg: Signature made using RSA key ID A8B2EF4287819B03D3516CCA76231C20425E9772 gpg: Good signature from "0" 2. Recalculate the image hash and make sure it matches your choice of hash below. $ sha256sum turnkey-cakephp-16.1-buster-amd64-vmdk.zip 97d9ff3dac96fb61d7a7cc5f155c68af8fde68e4a1b03b55185ece3e75f074e2 turnkey-cakephp-16.1-buster-amd64-vmdk.zip $ sha512sum turnkey-cakephp-16.1-buster-amd64-vmdk.zip d9db60a14edc8bbce2b86446e1b1c92659d18f8b9da9ca9c430d1502368e33b47c711a5a125672529e499ff84167b0adc9b7fe3624b0cc727ee55c8cadc04ce4 turnkey-cakephp-16.1-buster-amd64-vmdk.zip Note, you can compare hashes automatically:: $ sha256sum -c turnkey-cakephp-16.1-buster-amd64-vmdk.zip.hash turnkey-cakephp-16.1-buster-amd64-vmdk.zip: OK $ sha512sum -c turnkey-cakephp-16.1-buster-amd64-vmdk.zip.hash turnkey-cakephp-16.1-buster-amd64-vmdk.zip: OK Final note, when checking SHAs automatically, please ignore warning noting that some lines are improperly formatted. -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEE8ZCki1TcVrLH8k3LrF6wBJPlvBwFAmB7280ACgkQrF6wBJPl vByw0w/9GTGg2BN5nOlnT51g5Rf92G5eC7eIuVN470101ERRJCcHldobP+scK/UE Ceq6ldlpkb9kvqmJVVjoLY15gLxD9SGBSCJwBYu0JlkvLYq26XfFbAHuFbZcT2Fk rZYEX5kxeSRyREewiFi9LsQLv20vBo74Ha9cBIn5B3C/T9rKfLR3PdJWrZ56kL6d DM22n9iEmmzmV2Gl7Quwo2DdcNQCiF6SqaJfz+c4JxlK8F6hEIZxvDnvLRvCXi8/ cHe8DaTrJyz/84rMZkoeeIMffxM8IuxbSEEOxYMxIF1cNnqiQ3sRXGiDuDaXnyCu EYCfToD7QoNhJBM/VKSnfrr6hfN4wThuXicLVbFULTdZ9Qwb2ctE80cw3fo2a7Tl 2xXNs4YyqwO2QG3UQ4jYzDGv1gDDnlovSeWLcxtKf31Tcqv3t0hSAcKp+CnspZlM 1nTaBOmaViHp5LYFBPnTC8ZqbPK377x0hldBEhtHOLNGqHAG6fbMO7PLA5nTpf9O CufKNxltV144ZSIilCaM00zrgg/lg3Zajqp7lp8JbtjbN1psAB11j0npO2IojlKW yAIYjMnBtqlkY7XRcVShtQAV8b73a2yUEATqk6G6ozODvlhTp5eW6mPXRg9Yqjet LV3X60zqP6KlC9krLqP/LlYc1csc2ar5O9/CYl6E2MvquyGmjpE= =MMC+ -----END PGP SIGNATURE-----